Tag Archive for: Reach

Estonia’s BotGuard OÜ secures €12 million in Series A funding to expand global cybersecurity reach


– Advertisement –


BotGuard OÜ, a cybersecurity software company based in Tallinn, has secured €12 million in Series A funding led by MMC Ventures, with participation from Tera Ventures, Expeditions Fund, and angel investors including Stefan Lindeberg. The company specializes in helping web hosting providers manage and protect their infrastructure from malicious threats. With this funding, BotGuard OÜ plans to further develop its technology, recruit tech development talent, and expand its sales and marketing teams as it continues to scale globally.

BotGuard is a cybersecurity company founded in 2019, with a global presence and clients across more than 30 countries. The company specializes in developing user-friendly online tools designed to protect businesses from contemporary web threats. Embracing a remote-first culture, BotGuard boasts an international team comprising over 15 nationalities, collaborating on agile projects to enhance internet security for businesses and individuals worldwide. The company has secured funding through various rounds, with notable investors including Tera Ventures and Expeditions Fund.

Nik Rozenberg, CEO and co-founder at Botguard OÜ, says, “Every business should have effective web traffic management, yet there are no affordable solutions focused on the SME segment due to complicated and expensive onboarding processes. Malicious bot traffic can be extremely harmful for businesses – particularly for the likes of e-commerce retailers that depend on their website to operate – and organisations require tools that keep pace with the rapidly-evolving threat landscape. Even neutral web traffic – like some crawler bots – can drive up management costs. We are democratising web security by offering web hosting providers a flexible, easy-to-use, and cost-effective solution that still offers the highest level of control over web traffic. We are excited for this next stage of our growth journey as we continue to innovate and expand into new territories.”


Mina Samaan, Partner at MMC Ventures, states, “Born from the pain of living through this problem, Nik and Denis have built an impressive business, and the incredible traction BotGuard…

Source…

China’s Hackers Hijack Small Routers to Reach Big Targets


The United States announced the disruption of a botnet made of hundreds of U.S.-based small office or home office (SOHO) routers that were hijacked by state-sponsored hackers from the People’s Republic of China (PRC) in order to be used to attack U.S. infrastructure.

Hacker GreeceChina-backed hackers target U.S. computers. (Photo: Darwin Laganzon, Pixabay, License)“The hackers, known to the private sector as ‘Volt Typhoon,’ used privately-owned SOHO routers infected with the ‘KV Botnet’ malware to conceal the PRC origin of further hacking activities directed against U.S. and other foreign victims,” the U.S. Department of Justice said Wednesday in a statement.

Attorney General Merrick B. Garland stressed that the Justice Department has thwarted a China-supported hacking group that sought to target “America’s critical infrastructure” using a botnet.

That campaign had been the focus of a joint advisory issued in May 2023 by the FBI, National Security Agency, Cybersecurity and Infrastructure Security Agency (CISA), and international partners, according to the statement.

The Justice Department explained that the majority of routers in the KV Botnet were Cisco and NetGear routers, which were vulnerable due to reaching the ‘end-of-life’ status – meaning that they were no longer supported with security patches or other software updates from their manufacturers.

The operation authorized by the court involved removing the KV Botnet malware from the routers and disconnecting them by blocking communications with other devices responsible for controlling the botnet.

The statement referred to court documents, stating that the government extensively tested the operation on the relevant Cisco and NetGear routers without affecting their legitimate functions or collecting content information from the compromised routers.

However, authorities cautioned that the remediated routers remain susceptible to future attacks by Volt Typhoon and other hackers. They strongly recommended that owners of end-of-life SOHO routers in their networks replace them.

“China’s hackers are targeting American civilian critical infrastructure, pre-positioning to cause real-world harm to American citizens…

Source…

Cybersecurity Mesh Market to reach $5 Bn by 2032, Says


Selbyville, Delaware, Oct. 29, 2023 (GLOBE NEWSWIRE) —

The cybersecurity mesh market valuation is expected to surpass USD 5 billion by 2032, as reported in a research study by Global Market Insights Inc.

Increasing advancements in the IT environment are predicted to have a positive impact on the industry outlook. Modern IT ecosystems are becoming more complex and interconnected, with a combination of on-premises systems, cloud services, mobile devices, and IoT devices. Traditional perimeter-based security approaches are no longer sufficient to protect these diverse systems. This has pushed the use of cybersecurity mesh for more adaptable and context-aware security models that can protect these complex environments effectively.  

The cybersecurity mesh market from the SMEs segment is set to generate substantial revenues by 2032, owing to increasing adoption cloud-based technologies in organizations to streamline their operations and reduce costs. These cloud-based solutions, however, expose the firms to new security risks. This is bolstering the demand for cybersecurity mesh solutions for cloud-native security capabilities, allowing SMEs to secure their cloud environments effectively.

Request for a sample of this research report @ https://www.gminsights.com/request-sample/detail/5769

The cybersecurity mesh market share from government segment is slated to witness remarkable growth between 2023 and 2032, driven by the vast amount of sensitive data government agencies possess. The cybercriminals, state-sponsored hackers, and other malicious actors often attempt to breach government systems to gain access to classified information or disrupt critical infrastructure. This has prompted governments to invest heavily in cybersecurity solutions, including cybersecurity mesh, to protect their networks, systems, and data, adding to industry share.

Europe cybersecurity mesh market is estimated to grow massively through 2032, attributed to the digital transformation across various sectors, including finance, healthcare, manufacturing, and government services in the region. The governments across the region have implemented strict data protection regulations such as…

Source…

Hackers’ dwell time decline, but they are able to reach active directory very fast


Even as the cyber threat landscape is becoming more complex and dangerous, there seems to be an increase in the awareness levels on the importance of guarding one’s digital properties and networks. This sounds very good and encouraging. But bad news is that the hackers are able to reach the Active Directory (AD), one of the critical assets for a company, in less than a day. 

AD typically manages identity and access to resources across an organisation, meaning attackers can use AD to easily escalate their privileges on a system to simply log in and carry out a wide range of malicious activity.

According to the latest report by cybersecurity company Sophos, the average dwell time (the time an intruder lurks around in a computer network or a device undetected) has come down to eight days from 10 days in the first half of 2023.

With regard to ransomware attacks, the dwell time comes down to five days. In 2022, the median dwell time decreased from 15 to 10 days.

Also read: India’s AI talent pool on LinkedIn has grown 14-fold since 2016

The Active Adversary Report for Tech Leaders 2023, which provides an in-depth look at attacker behaviours and tools during the first half of 2023, analysed Sophos’ Incident Response (IR) cases from January to July 2023.

“It took on average less than a day—approximately 16 hours—for attackers to reach Active Directory (AD),” he said.

“Attacking an organisation’s Active Directory infrastructure makes sense from an offensive view. AD is usually the most powerful and privileged system in the network, providing broad access to the systems, applications, resources, and data that attackers can exploit in their attacks,” John Shier, field CTO, Sophos, said.

“When an attacker controls AD, they can control the organisation. The impact, escalation, and recovery overhead of an Active Directory attack is why it’s targeted,” he said.

“Getting to and gaining control of the Active Directory server in the attack chain provides adversaries several advantages. They can linger undetected to determine their next move, and, once they’re ready to go, they can blast through a victim’s network unimpeded,” he said.

Full recovery from a domain compromise…

Source…